Anda di halaman 1dari 66

eBusiness and

eCommerce

Chapter 3

2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

31

Learning Objective 2

Explain what is mean by eBusiness,


eCommerce, and Web Commerce.

2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

32

Electronic Business and


Electronic Commerce
Electronic business (eBusiness) refers to
the use of IT in any aspect of the business.
Electronic commerce (eCommerce) is defined as
using IT in the exchange of products and services
among organizations and individuals.
Web Commerce involves using IT in the exchange
of products and services among individuals
and organizations and over the Internet.
2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

33

Learning Objective 1

Explain the history of the


Internet and how it works.

2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

34

Electronic Networks
Electronic networks are groups of computers
that are connected together electronically.
Local area networks (LANs) are
networks that span a single site.
Metropolitan area networks (MANs)
span a single city or metropolitan area.
2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

35

Electronic Networks
Wide area networks (WANs)
are networks of computers
that span at least two
metropolitan areas.

2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

36

The Internet
The Internet is an electronic highway that allows
computers to communicate with each other.
The earliest practical version of the Internet was
created in the early 1970s by the Pentagons
Advanced Research Projects Agency (ARPA).
It was called ARPANET.
2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

37

The Internet

Bitnet

MILnet

NSFnet

They adopted a common set of communications


protocols called TCP/IP (Transmission Control
Protocol/Internet Protocol).
2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

38

The Internet
Transmission Control Protocol (TCP) divides
electronic messages into packets of information
and then reassembles these packets at the end.
Internet Protocol (IP) assigns a unique
address to each computer on the Internet.

2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

39

The Internet
Fixed IP address
Dynamic IP address
Domain name
Domain name servers
2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 10

Intranets and Extranets

It is a self-contained, in-house internet.


Extranets exist when the intranets of two
or more companies are linked together,
or when outsiders (such as customers or suppliers)
are able to access
2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 11

Intranet Security Issues


The Internet

Corporate Intranet

Network
computers

Firewall
2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 12

Client-Server Technology

It is a robot-type program that


constantly runs on some computers
and exchanges information with clients.

2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 13

Types of Servers
There are many kinds of servers on the Internet:
Mail servers

File servers

Web servers

Commerce servers

Application servers and Database servers


2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 14

Types of Servers
Mail Server
Senders
mail
client

Receivers
mail
client

Message
sender

Message
receiver
Senders
mail
server

Receivers
mail
server
The Internet

2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 15

Types of Servers
What are file servers?
File servers exist mainly
as repositories of files.
The most common protocol
for file serves is called FTP.
A file server that uses this
protocol is called an FTP server.
2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 16

Types of Servers
What is a Web server?
It is a server that allows a user (client)
to access documents and run computer
programs that reside on remote computers.
All Web clients (web browser) automatically
read and interpret HTML
(hypertext markup language).
2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 17

Types of Servers

They are specialized types of Web servers


with various commerce-related features.
Support for various types of client
and server authentication

2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 18

Types of Servers
Support for interfacing
with external programs
Enhanced security features
Support for various types
of electronic payments

2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 19

Types of Servers
Bank

Order/payment
information

Encrypted
communication
link

Consumers
Consumers
client
client

Internet

Verify
payment
Commerce
Commerce
server
server

Product information
and order verification
2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 20

Types of Servers

Corporate
Corporate
accounting
accounting
system
system

Commerce
Commerce
server
server

Goods shipped
to customer

Shipping
Shipping

2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

Order
Order
file
file

3 21

Types of Servers
Application Servers and Database Servers make
applications and data in databases
available to remote clients.
An application is a software program for some
functional use such as for
accounting, communications, or email.
A database is an organized collection of data that is
structured to be useful to those who use it.
2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 22

Three-tiered Application
Architecture
Presentation
tier

Logic
tier

Data
tier

Web
browser

Application
Server

Database
Server

2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 23

Learning Objective 3

Describe Enterprise
Architecture
and its domains

2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 24

E-Business and
Enterprise Architecture
AISs have evolved from simple recordkeeping and
reporting systems to sophisticated
Enterprise Application Suite (EAS).
SAP integrated operations, human relations,
and customer relations into
single software packages called ERP systems.
ERP systems were expanded to ERP II, and
ultimately into the EAS.
2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 25

E-Business and
Enterprise Architecture
AIS specialist needs to understand
how IS is embedded into
the enterprise architecture.
Enterprise architecture (EA) describes the joint
structure and behavior of the enterprise
and its information system.

2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 26

E-Business and
Enterprise Architecture
The enterprise architect is a person who
designs enterprise architectures to achieve
the following objectives:
Alignment of IT planning and strategy with business goals
Risk management associated with the IS
Optimal use of IS resources
Flexibility to adapt to IS to changing management needs

2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 27

E-Business and
Enterprise Architecture

Business
Information
Applications
Technical
2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 28

The Corporate Information


Factory

Data Acquisition
Data Management
Data Delivery

2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 29

The Corporate Information


Factory
Operations

Decision Support Interface

EDI

Datamart
Data
Acquisition

Data
Management

Data
Delivery
Datamart

ERP
Other
Operations

Data
Warehouse

Planning and Analytics

Operational
Database

Internet
Point of
Sale

Exploration
Warehouse

Data Mining
Warehouse

Transaction Interface

2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 30

The Applications Architecture


Applications architecture defines the applications
needed to run the business and how
the applications communicate
with each other through intranets, extranets, and EDI.

Use an ERP or EAS for application needs


Use an ERP or EAS in combination with other applications
Use some mixture of individual applications
2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 31

The Applications Architecture

Rely on the data sharing of ERPs and EASs


Use Service Oriented Architecture (SOA)
Use Client-Server technology
Use Middleware

2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 32

The Technical Architecture


Technical architecture describes the structure and
behavior of the IT infrastructure
and defines standards, principles, procedures,
and best practices to govern the IT architecture.
Applications, Database,
Enterprise Systems Management, Information,
Integration, Network and Comm, Platform, Security
2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 33

Learning Objective 4

Explain Enterprise Architecture


frameworks and
business process reference models

2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 34

Enterprise Architecture
Frameworks
The Zachman Framework
The Federal Enterprise Architecture (FEA)
The Open Group Architecture Framework (TOGAF)

2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 35

Business Process Frameworks


and
Reference Models
Business process frameworks focus on
transforming business processes,
making them better.
Business process reference model is
a set of best practices for a given
business process or group of processes.

2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 36

Business Process Frameworks


and
Reference Models
Value Chain Frameworks

Supply Chain Frameworks

2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 37

E-Business Architectures
eBusiness can be viewed as an enterprise architecture;
that is, a given set of specifications
for the 4 architectural domains.
Osterwalder Reference Model (ORM) defines
the typical business model in terms of
4 major domains:
Infrastructure, Offering, Customers, and Finance
2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 38

Learning Objective 5

Describe various approaches


to securing electronic
financial transactions.

2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 39

E-Commerce Technologies

Secret-key encryption
Public-key encryption
Digital envelopes
2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 40

Secret-Key Encryption
Secret key

Message

Encryption

Decryption

2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

Message

3 41

Public-Key Encryption
Recipients public key

Message

Encryption

Recipients private key

Ciphertext

Decryption

2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

Message

3 42

Digital Envelope
What is a digital envelope?
It is an encryption method in which the
message is encrypted with a secret
key, and the secret key is encrypted
with the recipients public key.
This method is sometimes referred
to as double-key encryption.
2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 43

Double-Key Encryption
Recipients
public key

Random
message key
Public-key
encryption

Message

Private-key
encryption

2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

Encrypted
message key

Ciphertext
3 44

Double-Key Encryption
Recipients
private key
Message key
Encrypted
message key

Ciphertext

Public-key
decryption

Private-key
decryption

2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

Message
3 45

Digital Signatures
A digital signature occurs when someone encrypts
a message with his or her own private key.
What is a hashing function?
A hashing function takes a long variable-length
string of characters and converts it into
a short fixed-length string.
2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 46

Digital Signature Creation


Hashing
algorithm

Senders
private key

Hash of
message

Public-key
decryption

Digital
signature

Message
2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 47

Verification of Digital Signature

Message

Digital
signature

Hashing
algorithm

Hash of
message

Public-key
decryption

2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

Verify
signature

Senders
public key
3 48

Digital Time-Stamping
What is a digital time-stamping service (DTS)?
It is an organization that adds
digital time-stamps to documents.

2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 49

Digital Time-Stamp Procedure


Attach date and time,
then digital signature
Message
Digital
Digitaltime
time
stamp
stampservice
service
Message

2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

Date and
time
Digital
signature

3 50

Verification of Digital TimeStamp

Message
Date and
time

Hash message Hashed message


and date
and date
and time
and time

Verify
Verify
match
match

Digital
signature
Decrypt DTSs
signature with
DTSs public key

Decrypted
digital
signature

2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 51

Security Issues for Public-Key


Encryption Systems
What is cryptanalysis attack?
It involves various techniques for
analyzing encrypted messages for
purposes of decoding them without
legitimate access to the keys.
The simplest possible attack on a message
is the guessed plaintext attack.
2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 52

Security Issues for Public-Key


Encryption Systems
The whole security of public-key encryption
depends on the assumption that an attacker
cannot factor the product of two large
prime numbers (factoring attack).
The best way to prevent cryptanalysis and
factoring attacks is to use very long keys.

2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 53

Security Issues for Public-Key


Encryption Systems
What are some ways of protecting private keys?
Creating and distributing keys
Digital certificates
Certificate revocation list (CRLS)
Certificate chains
Certificate-signing units
Key expirations
2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 54

Learning Objective 6

Describe various ecommerce


applications, including
payment systems,
Web stores, and Web 2.0.

2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 55

Electronic Commerce
Technologies Issues and
Applications
Electronic Bill Payment Systems
Credit and Debit Card Systems
(Payment Card Industry Data Security Standard)
Payment Intermediaries (PIs)
2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 56

Electronic Commerce
Technologies Issues and
Applications
What is digital cash?
It is money created when a bank attaches
its digital signature to a note promising
to pay the bearer some amount of money.

2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 57

Electronic Commerce
Technologies Issues and
Applications
What is blinding?
It is a technique in which a bank issues
digital cash in such a way the it is
unable to link the payer to the payee.
What is a blinded digital signature?
It is a digital signature and related digital
cash that have been issued with blinding.
2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 58

Electronic Commerce
Technologies Issues and
Applications
What is an electronic wallet?
It is a computer program that keeps track of
the various keys and items of information
associated with digital money.
What are smart cards?
They are hand-held electronic
cards that are used for payments.
2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 59

Electronic Commerce
Technologies Issues and
Applications
Memory cards
Shared-key cards
Signature-transporting cards
Signature-creating cards
2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 60

Customers

The Internet
Store

Web Host

Web Browser

The Internet

Merchants
Web Site

Shopping
Cart Software

1
2

Online Transaction
Server
2

Digital
Certificate
Authority

Merchants
Database
Server
Private Gateway

Financial Institution
for Clearing

Merchants
Bank

3
Merchants Accounting
Information System

2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 61

Integrating The Web Store with


The Accounting System
Small companies web stores are hosted by
shopping cart software that manages catalog,
user registration, orders, email confirmation,
even financial reports that are then imported
into general accounting software.
Larger companies use ERP systems that
integrate all the major accounting functions,
as well as the web store, into a single software.
2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 62

Web 2.0

Wiki
Blogs
RSS news feeds
Mashups
2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 63

Web 2.0

JavaScript (client-side)
Perl, PHP, VBScript (Server-side)
XML, XSLTs
Rich Internet Applications
2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 64

Trust in e-Commerce
Cookies
Web Trust

2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 65

End of Chapter
3

2010 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 10/e, by Bodnar/Hopwood

3 66

Anda mungkin juga menyukai